yeah, totally, does facebook or google lay out in detail how they are scanning for csam ?
i don't think so, their system of server side scanning is infinitely more opaque, dangerous and open to considersably more abuse, they may only be using 1 database of csam which could be corrupted, they are not detailing how they are getting images or using and comparing them
apple is using only those hashes which appear in 2 separate databases which insures that the material being compared against is actual verified csam
apple is putting the database in plain sight and providing the hash for all to see and allowing 3rd party audit, we the users can check the hash on our device
if the nsa really wants to use a backdoor via the fisa they can damn sure do it anytime they want, this attempt by apple to deal with csam neither stops them nor does it make it any easier for the nsa to do what it wants, they'll just do it
i am afraid we are seeing a river of paranoia here along the lines, as you say, of "anything is possible", yeah anything is possible, tim cook may be the manchurian candidate, an nsa stooge
i don't think people are taking into account just what it would take for governments to pass legislation permanently breaking encryption and security on phones
we need to find a new way forward that balances the needs of government and the rights of users and from what i see apple is trying to do just that
in the end it all comes down to trust, if you really don't trust apple then go somewhere else, how about google
i think we have no choice but to trust and take the tradeoff of transparent, verifiable on device scanning, for the e2ee encryption that i believe apple is working toward